Libri sul tema "Computer security"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 libri per l'attività di ricerca sul tema "Computer security".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.
Pamela, Kane, ed. Compute!'s computer security. Greensboro, N.C: Compute! Books, 1989.
Cerca il testo completoW, Roberts D. Computer security. London: Blenheim Online Publications, 1990.
Cerca il testo completoHollmann, Pauline. Computer security. Washington, D.C: Science Reference Section, Science and Technology Division, Library of Congress, 1985.
Cerca il testo completoKatsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, and Christos Kalloniatis, eds. Computer Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12786-2.
Testo completoKatsikas, Sokratis, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2.
Testo completoFournaris, Apostolos P., Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42051-2.
Testo completoLopez, Javier, Jianying Zhou, and Miguel Soriano, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98989-1.
Testo completoLopez, Javier, Jianying Zhou, and Miguel Soriano, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99073-6.
Testo completoBoureanu, Ioana, Constantin Cătălin Drăgan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman, et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66504-3.
Testo completoKatsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, and Stefanos Gritzalis, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72817-9.
Testo completoKatsikas, Sokratis, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Weizhi Meng, and Steven Furnell, eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64330-0.
Testo completoHollmann, Pauline. Computer security. Washington, D.C: Science Reference Section, Science and Technology Division, Library of Congress, 1985.
Cerca il testo completoBooks, Time-Life, ed. Computer security. Alexandria, Va: Time-Life Books, 1986.
Cerca il testo completoCarroll, John Millar. Computer security. 2nd ed. Boston: Butterworths, 1987.
Cerca il testo completoBooks, Time-Life, ed. Computer security. Alexandria, Va: Time-Life Books, 1990.
Cerca il testo completoBulmer, O. F. Computer security. [London]: Institute of Chartered Accountants in England and Wales, 1988.
Cerca il testo completoHollmann, Pauline. Computer security. Washington, D.C: Science Reference Section, Science and Technology Division, Library of Congress, 1985.
Cerca il testo completo(Firm), Shotlist, Films for the Humanities (Firm), and BDP Media Solutions (Firm), eds. Computer security. Princeton, NJ: Films for the Humanities & Sciences, 2001.
Cerca il testo completoHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Cerca il testo completoKotenko, Igor, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14706-7.
Testo completoRak, Jacek, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, and Krzysztof Szczypiorski, eds. Computer Network Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65127-9.
Testo completoGorodetsky, Vladimir, Igor Kotenko, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11560326.
Testo completoGorodetsky, Vladimir, Igor Kotenko, and Victor A. Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73986-9.
Testo completoWang, Jie. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-79698-5.
Testo completoKotenko, Igor, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33704-8.
Testo completoBosworth, Seymour, Michel E. Kabay, and Eric Whyne, eds. Computer Security Handbook. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118820650.
Testo completoKizza, Joseph Migga. Computer Network Security. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/b106962.
Testo completoGorodetsky, Vladimir, Leonard Popyack, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/b12005.
Testo completoBosworth, Seymour, Michel E. Kabay, and Eric Whyne, eds. Computer Security Handbook. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118851678.
Testo completoForcht, Karen Anne. Computer security management. Danvers, Mass: Boyd & Fraser, 1994.
Cerca il testo completoSeymour, Bosworth, Kabay Michel E, and Whyne Eric 1981-, eds. Computer security handbook. 5th ed. Hoboken, N.J: John Wiley & Sons, 2009.
Cerca il testo completoDeborah, Russell, Gangemi G. T, and Russell Deborah, eds. Computer Security Basics. 2nd ed. Sebastopol, CA: O'Reilly & Associates, 2006.
Cerca il testo completoM, Jackson Keith, ed. Computer security solutions. Boca Raton: CRC Press, 1990.
Cerca il testo completoWilma, Caldwell, ed. Computer security sourcebook. Detroit, MI: Omnigraphics, 2003.
Cerca il testo completoinc, International Resource Development, ed. Computer security markets. Norwalk, Conn., U.S.A. (6 Prowitt St., Norwalk 06855): International Resource Development, 1987.
Cerca il testo completoSnekkenes, Einar. Computer Security: Proceedings. Berlin: Springer, 2003.
Cerca il testo completoRussell, Deborah. Computer security basics. Sebastopol, Calif: O'Reilly, 1991.
Cerca il testo completoE, Hutt Arthur, Bosworth Seymour, and Hoyt Douglas B, eds. Computer security handbook. 3rd ed. New York: Wiley, 1995.
Cerca il testo completoWatt, Steve. Computer security manager. Oxford, Eng: Elsevier Advanced Technology in association with Alkemi Ltd, 1989.
Cerca il testo completoRussell, Deborah. Computer Security Basics. Cambridge, MA: O'Reilly & Associates, 1992.
Cerca il testo completoBaker, Richard H. Computer security handbook. 2nd ed. Blue Ridge Summit, PA: TAB Professional and Reference Books, 1991.
Cerca il testo completoHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Cerca il testo completoBOOKS, Editors of TIME-LIFE. Computer Security (Understanding Computers). Time Life UK, 1987.
Cerca il testo completoDu, Wenliang. Computer Security. 3rd ed. WORLD SCIENTIFIC, 2022. http://dx.doi.org/10.1142/13053.
Testo completoGollmann, Dieter. Computer Security. Wiley & Sons, Incorporated, John, 2007.
Cerca il testo completoBrown, Lawrie, and William Stallings. Computer Security. Pearson Education, Limited, 2018.
Cerca il testo completo